PrepAway - Latest Free Exam Questions & Answers

Category: SCNP

Exam SCNP: SCNP Strategic Infrastructure Security

What is the effect of following these commands and actions?

After installing a new SuSe Linux system, you wish to enhance the security of this computer. You
type in the following commands (with actions in parenthesis): grub (press Enter) md5crypt qwerty
(copy the result of this command) quit
gedit /boot/grub/menu.1st & password -md5 (Paste what you copied earlier)
(Save and close gedit)
What is the effect of following these commands and actions?

which of the following computers will implement IPSec method 4?

In Windows Server 2003, there are four methods of implementing IPSec. They are:
1 – Require Security
2 – Request Security
3 – Respond Only
4 – No IPSec Policy
Your network hosts many servers, and different security policies are in place in different locations
in the network. The Clients and Servers in your network are configured as follows:
-You have servers numbered 1-9, which have a policy stating they require no network traffic
security.
-You have servers numbered 10-19, which have a policy stating they are not required to be
secure, but will encrypt network traffic if the client is able to receive it.
-You have servers numbered 20-29, which have a policy stating they are required to be secure
and all network traffic they deliver must be secured.
-You have clients numbered 60-79 that are required to access secure servers 20-29.
-You have clients numbered 80-99 that are not required to access secure servers 20-29, but are
required to access servers 1-9 and 10-19.
Based on the Client and Server configuration provided above, which of the following computers
will implement IPSec method 4?


Page 17 of 24« First...10...1516171819...Last »